77 resources related to Information Industry
- Topics related to Information Industry
- IEEE Organizations related to Information Industry
- Conferences related to Information Industry
- Periodicals related to Information Industry
- Most published Xplore authors for Information Industry
No organizations are currently tagged "Information Industry"
IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 14th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “Internet of Things as System of Systems”. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.
This conference presents excellent, novel, and contemporary papers covering all aspects of Data ? including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights; and, to create visualizations to aid in presenting and understanding the data. System development and integration needs to also adapt to these new algorithms, technologies, tools, and needs. This conference and its constituents support the development of technologies and applications for peaceful purposes to improve the human condition.
The aim of IEEE ITAIC 2019 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. It provides opportunities for the delegates to exchange new ideas and application experiences, to establish business or research relations and to find global partners for future collaboration.
No periodicals are currently tagged "Information Industry"
2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018
Malware and backdoor usually hide their malicious activities to communicate with C&C; server through HTTP protocol. Various techniques for stealth are developed which directly leads security system's failure to detect hacker's activities. This paper focuses on profiling fingerprints of browsers running on different client-side host to detect anomaly among outbound HTTP traffics at behavioral and semantic level. Patterns describing fake ...
2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT), 2017
In recent years, utilization of technology-assisted models for the teaching field have achieved more innovation and advancement with the improvement of information technology. The popularization of high speed networks even facilitates live stream teaching to be an important learning channel. By cooperating with domestic dealers of Maker Education, Smart Campus promoted by the Industrial Development Bureau of the Ministry of ...
2016 International Computer Symposium (ICS), 2016
The objective of visual cryptography is to hide secret in multiple share images. Then, stacking share images together decrypts hidden secret by human visual system. As the share images are given with different priorities, those share images hide various degrees of secret, which is the objective of progressive visual cryptography. This paper presents a scheme to realize progressive visual cryptography. ...
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), 2015
Total fertility rate of the world comes down every year. Low fertility rate implies the coming of aging societies, it raises high pressure to younger for the elder care. The objective of activity recognition is helpful for smart space technology in efficient allocation of manpower for elder care. We propose the activity recognition scheme performed on mono-type sensor network in ...
2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2018
Sensor fusion, especially in 2D cameras and 3D laser scanners, is crucial for robot and autonomous driving. Calibration is a major aspect of sensor fusion. Most of the calibration is conducted offline by using checkerboards to determine the sensor pose. However, problems arise when robots or vehicles have irregular vibrations during movement. This leads to sensors having a different position ...
Cafe: Cloud Appliances for Enterprises
IEEE GLOBECOM 2010
The Future of Home & Factory Automation Systems: Mouser's Innovation Spotlight with Grant Imahara
Q&A with Dr. Claudio Demartini: IEEE Big Data Podcast, Episode 4
Big Data & the Cloud: Privacy and Security issues
Technology Time Machine - Gauging the Future
What IEEE SSCS Membership has Done for Me
Stay Fearless - Paula Tolliver - WIE ILC 2018
International Broadcast Conference(IBC) News: Segment 4
Highlights from the “Industry Summit on Future of Computing” - Bruce Kraemer - ICRC San Mateo, 2019
Transportation Electrification: The Connected Locomotive
What members say about IEEE Communications Society
A 28nm, 475mW, 0.4-to-1.7GHz Embedded Transceiver Front-End Enabling High-Speed Data Streaming Within Home Cable Networks: RFIC Industry Showcase
ComSoc: Join Us!
Where Do We Go From Here? The Path to Standards for Fog Computing and Networking - Helder Antunes & Rob Fish, Fog World Congress 2017
Sylvie-Spalmacin Roma, IBM Smarter Cities
Jean-Francois Balcon, Cisco Smart+Connected Communities
Cyber Security: Why It’s Everyone’s Business - Panel at IEEE WIE Forum USA East 2017
Michel Parent, INRIA Cybercars
Malware and backdoor usually hide their malicious activities to communicate with C&C; server through HTTP protocol. Various techniques for stealth are developed which directly leads security system's failure to detect hacker's activities. This paper focuses on profiling fingerprints of browsers running on different client-side host to detect anomaly among outbound HTTP traffics at behavioral and semantic level. Patterns describing fake header are also elaborately designed using graph structure and become significant features in the proposed method for the subsequent detection. Performance of proposed approach are evaluated with data from realistic environment and compare to state-of-the-art. Results show that the proposed method delivers accuracy up to 99%, also for the counterfeit fingerprint's detection it even achieve 100% recall, while the alternative approach totally failed under this scenario.
In recent years, utilization of technology-assisted models for the teaching field have achieved more innovation and advancement with the improvement of information technology. The popularization of high speed networks even facilitates live stream teaching to be an important learning channel. By cooperating with domestic dealers of Maker Education, Smart Campus promoted by the Industrial Development Bureau of the Ministry of Economic Affairs strives to generalize the robotics course both at home and abroad, and introduce the course to remote schools via the method of live streaming. The study adopts a quasi-experimental design to discuss students from "Robotics Course based on Live Stream Teaching" (the experimental group) and "Robotics Course based on On-the-spot Teaching" (the control group) and to compare their learning motivation, problem solving ability and capacity of critical thinking in the robotics course of Maker Education. Meanwhile, the study also compares their cognitive loads to see whether students' loads of learning would increase with the introduction of live stream. Results show that no significant differences arise for both groups. It means that the use of live stream for courses of Maker Education can also achieve efficiency of general instruction methods.
The objective of visual cryptography is to hide secret in multiple share images. Then, stacking share images together decrypts hidden secret by human visual system. As the share images are given with different priorities, those share images hide various degrees of secret, which is the objective of progressive visual cryptography. This paper presents a scheme to realize progressive visual cryptography. A 2x2 block is the basic element of share image, and we design block pairs for secret hiding as well as secret encryption. The degrees of hidden secret depend on the priorities of share images. The proposed scheme is capable of decrypting partial secret and inferring the stacked shares. The experiment results will demonstrate that our scheme further achieves applications based on progressive visual cryptography, including self-decryption watermark, and inference of shares stacking.
Total fertility rate of the world comes down every year. Low fertility rate implies the coming of aging societies, it raises high pressure to younger for the elder care. The objective of activity recognition is helpful for smart space technology in efficient allocation of manpower for elder care. We propose the activity recognition scheme performed on mono-type sensor network in space. Probability-based classification is available by analyzing sensor signal in order to train parameters of activity recognizers. The experiment results demonstrate that our scheme is capable of recognizing activities, generating activity of daily living, and detecting anomaly.
Sensor fusion, especially in 2D cameras and 3D laser scanners, is crucial for robot and autonomous driving. Calibration is a major aspect of sensor fusion. Most of the calibration is conducted offline by using checkerboards to determine the sensor pose. However, problems arise when robots or vehicles have irregular vibrations during movement. This leads to sensors having a different position from the initial pose. Therefore, online calibration, which allows robots to be calibrated at any time during their movement, is required. This study focused on calibrating a 2D camera and 3D lidar scanner by using their resembling features. For lidar calibration, we transformed the 3D point cloud into a 2D range image and removed the edge points. For calibrating the camera, we applied an edge filter to the image. Then, the inverse distance transform was used to identify the alignment of the edges. The sensor pose relative to the camera and lidar system was determined from their corresponding images.
Global advanced countries are committed to layout and integration wireless communication technology, platform integration, instant analysis, data add value, etc. These are the Key issues that directly affect the development of internet device. In terms of service usage situation, the service application situation of terminal consumers in the future will be connected by a ubiquitous network to all devices, and the application and service of each terminal are connected. However, the development of the relevant areas of Taiwan, at present, the development focus of internet products and applications is still in the hardware device, including chips, a variety of terminal equipment. But lack of thinking from the service and application situation and connect the market for the whole service system and hardware device. The paper at last through the actual business verification, on the APP, the total average stay time of assignment increased by 55.96%, total average bounce rate of assignment reduced 53.44%, total average click through rate of assignment increased 1.1 times, total average click through rate of commodity increased 1.3 times, total average redemption rate of commodity increased 2.29 times, total average purchase rate of the commodity increased 12 times. More fully represents the results of this research fit the use's preference.
With the rising trends of dialog system, interactions with questions become a vital human-machine interface in realizing intentions and generating adequate feedback, thereby establishing question generation as an important and interesting research topic. In the education domain, question generation is also useful for reducing time and effort for teachers, as well as parents. Extensive research has been conducted on question generation recently but little focused on question generation in Chinese. In addition, previous papers examining question generation in Chinese, have been poorly reviewed due to the clumsy handling of sentence complexities of Chinese. In this article, we focus on developing a question generation technique based on children's tales. For the training and testing dataset, approximately one hundred articles from the website, (http://www.yfes.tn.edu.tw/yfesvi/story.htm) were used. To achieve better quality of the questions automatically generated, approaches and methods were carefully chosen in this system. The results show that questions generated from our system are mostly acceptable, which reflects the main objective of our system.
Path planning is one of the most studied problems in the field of robotics, unmanned aerial vehicles (uavs), vehicle navigation and fields like these. The majority algorithms of path planning produce possible paths of grid graph, and then apply in problems such as classical graph route searching. Astar algorithm, Hierarchical Path-Finding A-star (HPA*) and Jump Point Search (JPS) algorithms are studied in this paper to compare the maze searching capacity and different search maps' efficiency. We also propose an improved JPS algorithm in symmetric grid graph. In this paper, we compare their search time and efficiency. Conducted experiment shows that by adopting the same benchmarks our algorithm not only tackles the congestion problem, but also solves the problem more efficiently. Experiments validated the improved JPS algorithm and results show it outperforms the other algorithms.
Information technology has irrevocably transformed businesses, education, healthcare, banking, government, and many other key sectors. It is impacting nearly every aspect of human activities in practically all fields redefining the way we live, communicate, socialize, collaborate, and transact. It also continues to leap ahead offering new capabilities and extending its utility. Adoption of IT in practice, however, presents several technical, organisational and societal challenges. This panel will present a snapshot status of IT in practice in the developed and emerging world, outline IT prospects and discuss challenges that IT sector, businesses and government must address to realize the fuller potential of IT. It will also provide directions for further research and development.
Taiwan currently faces a severe talent shortage. According to ManpowerGroup Talent Shortage Survey 2016, 73% of employers in Taiwan experience difficulty in recruiting talents, which is the second highest rate of talent shortage in the world. Human capital is the critical key to well-being and economic growth; therefore, the talent shortage has become an urgent issue for the government to solve. In the age of digital transformation, the ability to use a fast and effective model for developing digital talent is of the utmost importance to Taiwan's future. Hence, this study developed Innovative Hybrid Model for Developing Cross-Domain ICT Talent in Digital Economy to cultivate future talents needed. The program had already produced many of outstanding outcomes and created significantly impacted upon Taiwan's talent development including received the ATD (Association for Talent Development) award of Innovation in Talent Development.
No standards are currently tagged "Information Industry"